Aug 10, 2022
version = 1 [[analyzers]] name = "terraform" enabled = true
Passwords can be brute-forced, are prone to human error with possibitlies of weak password creation. Moreover password policies may be frustrating. Using SSH keys reduces the brute force attack vector to significant degrees.
ABACpermissions are enabled TF-GCP005
In Kubernetes, RBAC is used to grant permissions to resources at the cluster and namespace level. RBAC allows you to define roles with rules containing a set of permissions. RBAC has significant security advantages and is now stable in Kubernetes, hence ABAC is not recommended. Refer https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control for more details.
Warns against to prevent accidental exposure of internal assets.
Terraform's documentation outlines a Standard Module Structure. A minimal module should have a
outputs.tf file. Variable and output blocks should be included in the corresponding file.
It is not recommended to use outdated/insecure TLS versions for encryption.